Exchange

Email

15 sections
185 source tickets

Last synthesized: 2026-02-13 02:27 | Model: gpt-5-mini
Table of Contents

1. Mailbox decommissioning, autoresponders and alias identification

60 tickets

2. Mailbox access, send-as/send-on-behalf and service account provisioning

52 tickets

3. SMTP forwarding / Email-to-Case failures and message-trace troubleshooting

45 tickets

4. Large attachment delivery failures and transfer limits

1 tickets

5. M365 Group (Team) exists in Teams but is hidden from Outlook/Exchange clients

4 tickets

6. Outlook desktop rules: forwarding rules not persisting or applying

1 tickets

7. Mailbox display name mismatch in GAL / address lists

5 tickets

8. Mobile sign-in failures on iPhone where login aborted immediately after password entry

3 tickets

9. Third-party tools (EWS-based) missing guest members because guest accounts have empty mail attribute

2 tickets

10. Conditional Access / MFA login loop caused by identity provisioning and dynamic group assignment

1 tickets

11. Permanent mailbox data loss when Deleted Items and backups contain no recoverable copies

2 tickets

12. Automated LMS (LMS365/Zensai) cancellations generating calendar cancel emails

1 tickets

13. Password reset / account recovery when reset email targets the inaccessible mailbox

5 tickets

14. Mailbox approaching 100 GB quota — archive options and trade-offs

2 tickets

15. Sender does not receive copy of email sent to Microsoft 365 (Office 365) Group

1 tickets

1. Mailbox decommissioning, autoresponders and alias identification
94% confidence
Problem Pattern

Mail routing and mailbox reachability failures after renames, offboarding, provisioning or license changes causing bounced or undelivered mail, broken forwarding (including integrations such as Salesforce), and delivery to unintended mailboxes. Common error symptoms included EOP bounces like 'Recipient address rejected: Access denied' and 'Email address does not exist', non‑delivery for unlicensed or .ext accounts, persistent or looping automatic replies, recurring meeting invitations reappearing in user calendars and being undeclinable, Teams/SSO access loss for external accounts, and stale Global Address List/autocomplete entries. Affected systems included Exchange Online/EOP, Azure AD/Entra and directory sync, Teams and calendar services, Okta/SSO contexts, provisioning systems and third‑party integrations.

Solution

Investigations combined message header analysis, Exchange/Graph queries, mailbox/archive searches and directory inspections to determine whether addresses were full mailboxes, primary or secondary SMTP proxies, mail‑enabled groups/Teams objects, external ('.ext') accounts, or were subject to forwarding/inbox/transport rules. Licensing faults that prevented delivery and forwarding were resolved by remediating affected Microsoft 365 licenses (including restoring removed license groups), which restored inbound delivery, forwarding and Teams/SSO access where role‑scoped contexts had been disabled. Primary SMTP addresses were reassigned and legacy addresses retained as secondary SMTPs where required; duplicate, stale or orphaned aliases and enterprise‑app artifacts were removed after identifying the authoritative source and, when necessary, ownership was transferred to the correct mailbox. Email‑enabled security groups were deleted and their addresses repointed as proxy addresses on the appropriate Office 365 groups when delivery semantics changed. Forwarding and inbox/transport rules that redirected mail externally or to incorrect targets were corrected or disabled and delivery was reconfigured so a local copy remained where automatic replies were expected. Automatic‑reply loops and persistent redirecting replies were stopped by disabling or editing conflicting autoreplies; external '.ext' accounts that had become blocked or expired were reactivated and assigned owners so inbound routing and portal/Teams access resumed. Delegation, send‑as and full‑access permissions altered by renames or reprovisioning were reprovisioned or revoked as required. Recurring calendar invitations that reappeared for users were traced to orphaned organizer mailboxes or lingering calendar ownership; removing or reassigning the owner mailbox (or hiding/deleting the mailbox from address lists) and clearing delegate/calendar forwarding stopped the repeated invites. Teams/course‑feed and distribution lists with oversized or stale memberships were pruned to stop unwanted notifications; where Teams group addresses could not host forwarding or automatic replies, delivery was moved to a dedicated mailbox hidden from address lists. Mailbox merges, migrations and archived‑message retrievals were performed by exporting/importing mailbox contents or using mailbox/archive search to extract required items (for example finance receipts) before aliasing or redirecting delivery so data and access semantics were preserved. Client‑side cache effects were mitigated by allowing directory propagation and signing users out/clearing Teams and Office caches so GAL/autocomplete lists refreshed. As a short‑term mitigation for stale directory suggestions, expired or external '.ext' entries were hidden from the Global Address List while authoritative records were reconciled.

2. Mailbox access, send-as/send-on-behalf and service account provisioning
95% confidence
Problem Pattern

Mailboxes, aliases and mail‑enabled groups were missing, inaccessible, or failed to auto‑mount in Outlook/OWA. Users reported missing mail, calendar entries or folders in the Outlook client (including folders moved but not visible locally while present on the server), OWA errors such as "User has no mailbox and no license assigned", Outlook failing to auto‑bind newly created mailboxes, and send failures with errors like “You are not authorized to send mail on behalf of the specified sending account”, Microsoft.Exchange.Data.Storage.SendAsDeniedException, 0x80070005 or EC 1244. Power Automate flows and third‑party services reported sender‑authorization failures, and inbound routing failed for newly added domains or catch‑all addresses.

Solution

Administrators resolved mailbox provisioning, access and send failures by verifying identities/ownership, restoring or recreating mailbox objects, remediating Microsoft 365 licensing, and explicitly granting or reapplying mailbox and send permissions. Key observations and actions that resolved incidents included:

• Live mailbox verification via OWA: Several incidents where folders or items appeared missing in the Outlook client were traced to client-side/cached OST views; opening the mailbox in OWA showed the live mailbox and revealed moved or present folders that were not visible in the local client. Locating items in OWA was used to confirm mailbox state and guide remediation.

• Licensing and mailbox state: Missing or expired Microsoft 365 licenses left mailboxes and forwarding inactive; assigning the required license provisioned the mailbox and restored OWA/Outlook access (common OWA error: "User has no mailbox and no license assigned").

• Mailbox and alias provisioning: New user, shared and service mailboxes were provisioned and proxy/alternate-domain addresses added; address changes typically propagated to clients in about an hour and permission changes in minutes. Newly created mailboxes reappeared in user profiles after Exchange recovery and propagation.

• Shared/catch‑all and multi‑staff access: Shared or catch‑all mailboxes were provisioned for multi‑staff access and staff were granted explicit access; proxy/secondary domains were configured to route inbound mail into intended primary mailboxes while preventing undesired send‑from when required.

• Third‑party integrations and service accounts: Some applications required interactive Microsoft accounts and could not use shared mailboxes. In those cases licensed service accounts with documented owners and credentials were provisioned. For external sending (AWS SES, SMTP relays) authorized sender/From addresses and DNS records (SPF/DKIM) were gathered and validated for outbound delivery.

• Credentials and owner assignment: Mailbox passwords for automated systems were reset when owners lacked credentials and manager/owner assignments were validated so ownership was documented.

• Access visibility and group membership: Cases where mailbox visibility relied solely on membership in mail‑enabled security/distribution groups were changed by granting direct mailbox access or adjusting group membership so mailboxes mounted in Outlook rather than appearing only via group‑based views.

• Send permissions and allowed‑senders restrictions: Send failures were traced to missing Send‑As/Send‑On‑Behalf/Full‑Access grants or to AcceptMessagesOnlyFrom/AcceptMessagesOnlyFromSendersOrMembers restrictions that excluded senders. Send‑As permissions were granted or reapplied; reapplying Send‑As often resolved Power Automate authorization errors.

• Repairing lists and EAC limitations: When the Exchange Admin Center failed to save allowed‑senders or group send lists (for example due to non‑unique display names), lists were rebuilt and applied via Exchange Online PowerShell (examples: Set-UnifiedGroup -AcceptMessagesOnlyFromSendersOrMembers @{Add=
}, Add-RecipientPermission / Get-RecipientPermission).

• Alias and tenant‑level behavior: Tenant settings affected alias sending; SendFromAliasEnabled was changed where alias sending was required (Set-OrganizationConfig -SendFromAliasEnabled $true).

• Exchange RBAC/role assignment for remediation: A custom Exchange Online admin role was created to delegate Mail Recipients capability so specific staff could view/manage Inbox rules and remediate compromised accounts without broad admin rights.

• Diagnostics and observed errors: NDRs and client errors indicating send‑denials were diagnosed by reviewing headers and Exchange diagnostics. Observed errors included Microsoft.Exchange.Data.Storage.SendAsDeniedException, MAPI/transport diagnostics such as 0x80070005 and EC 1244, and Power Automate authorization errors; clientRequestId and serviceRequestId values were captured when available.

• S/MIME and shared‑mailbox encryption: S/MIME being per‑user complicated encrypted sending/receiving from shared mailboxes because all mailbox users needed access to the same certificate.

• Consolidation and cleanup: Orphaned addresses and distribution lists were consolidated into intended mailbox objects; Microsoft 365 unified groups were provisioned and populated when requested to avoid accidental group‑based access dependencies.

Incidents were closed after reactivating or reassigning licenses, restoring or recreating mailbox objects, resetting credentials and documenting ownership, explicitly granting or reapplying Send‑As/Send‑On‑Behalf/Full‑Access permissions, repairing allowed‑senders lists via PowerShell when EAC failed, provisioning appropriate shared/service mailboxes (including licensed service accounts for third‑party app bindings), and creating tailored Exchange RBAC roles for delegation. Observed propagation times were typically ~1 hour for address propagation and a few minutes for permission propagation.

3. SMTP forwarding / Email-to-Case failures and message-trace troubleshooting
93% confidence
Problem Pattern

Inbound or outbound Exchange Online messages failed to reach intended recipients or external ingest endpoints and produced SMTP/Exchange errors such as '550 5.4.1 Recipient address rejected', '550 5.4.103 ROUTING.NoConnectorForAddressType', '550 5.1.8 Access denied AS(42004)', '5.7.703 Message blocked by tenant allow/block list', or '5.7.129 sender not permitted to send to recipient/group'. Symptoms included delivery failure NDRs, messages quarantined as 'Blocked by organization policy', RCPT‑level rejections for invalid forwarding targets, routing to spam/junk, missing case/ticket creation at external portals, distribution‑group delivery rejections that prevented Teams meeting invites from appearing in recipients' calendars, and S/MIME signature verification failures on forwarded messages.

Solution

Delivery and forwarding failures in Exchange Online were resolved by combined mailbox, connector, policy and trace actions that isolated routing, permission, and reputation causes. Key outcomes and observations included:

• Group/accept‑list delivery rejections were observed as DSN 5.7.129; these correlated to recipient distribution/group delivery settings that rejected the sender and caused Teams meeting invitations to be undelivered and not to appear in recipients' calendars.
• Tenant‑level blocking and quarantines with 'Blocked by organization policy' or 5.7.703 were remedied by reviewing Tenant Allow/Block List and Defender/EOP safe/blocked lists; inappropriate block entries were removed and verified senders/domains were added to trusted lists where appropriate.
• Mailbox acceptance and routing were restored by repairing or reassigning licenses for mailboxes that returned 'mailbox doesn't exist' errors, and by creating or reactivating missing mail‑flow/catch‑all rules so messages for unprovisioned mailboxes reached processing queues.
• Stale forwarding properties (ForwardingSmtpAddress/ForwardingAddress and DeliverToMailboxAndForward) and duplicate/multiple forwarding targets were removed or corrected; edits via PowerShell were applied when the EAC blocked changes. Invalid external forwarding targets and cross‑tenant forwarding limitations were identified as RCPT‑level rejection causes.
• IMCEAHTTPS/NoConnector routing failures (550 5.4.103) were resolved by adjusting outbound connector and routing configuration so Exchange could process IMCEAHTTPS‑encoded recipients (examples included delivery to Atlassian/Jira addresses).
• Partial delivery and NDRs caused by mailbox‑full conditions or duplicate forwards were fixed by clearing quotas and normalizing forwarding rules.
• False spam deliveries were reduced by targeted transport rules that set Spam Confidence Level (SCL) to 'Very Low' for verified senders or known sending IPs after validating the sender identity and source IP, avoiding broad domain whitelisting.
• Outbound bounces related to unrecognized senders or temporary per‑sender limits were correlated with documented Exchange Online per‑mailbox sending limits; high‑volume mail was routed through approved mass‑mailing channels to avoid throttling and deliverability problems.
• Intermittent AS(42004) '550 5.1.8 Access denied' rejections affecting single users were correlated to transient service‑side transport/reputation conditions in Exchange Online when trace data was available.
• S/MIME signature verification failures reported in OWA were correlated with forwarding behavior in observed cases, linking signature verification issues to forwarding paths.
• Obtained Exchange Administrator privileges (via PIM) when required to run message traces and correlate Defender 'Blocked/Failed' events with Exchange trace data.
• Investigations consolidated Exchange Online message‑trace CSV exports, Defender/EOP logs, mailbox property inspection via PowerShell, and external gateway logs (for example vipremail) with NDRs, bounce text, and timestamps to identify routing, authentication, and policy causes.

These actions restored external ingestion and recipient delivery, removed outbound send blocks caused by tenant allow/block list entries or temporary limits, corrected connector/routing errors for IMCEAHTTPS‑encoded recipients, reduced spam‑folder deliveries, repaired forwarding and mailbox configuration issues, and produced traceable logs for downstream investigations.

4. Large attachment delivery failures and transfer limits
70% confidence
Problem Pattern

Senders reported that large email attachments (example ~50 MB) were not being received by external recipients or were failing to surface in downstream systems; symptoms included missing messages despite some delivery logs and failed SharePoint uploads due to absent verification steps.

Solution

The sender split the large attachments across multiple smaller messages to avoid transfer limits and retried delivery; mail logs and delivery traces were reviewed, which showed some messages had been delivered to the organization while oversized combined attachments risked hitting transfer/receiving limits despite prior increases to default thresholds.

Source Tickets (1)
5. M365 Group (Team) exists in Teams but is hidden from Outlook/Exchange clients
90% confidence
Problem Pattern

A Microsoft 365 group (Team) or mailbox existed in Teams/Azure AD but did not appear or was not manageable in Exchange/Outlook/EAC or address lists. Symptoms included the group or mailbox missing from Outlook/M365 Groups search or the Global Address List (GAL), an inaccessible group calendar, inability to edit owners/membership in Exchange Admin Center, and errors such as “address is already taken” when attempting to recreate or rename the object. Affected systems included Microsoft Teams, Exchange Online / Exchange Admin Center, Outlook (web and desktop), and Microsoft 365 / Azure AD group or mailbox listings.

Solution

Two separate causes produced identical symptoms and were resolved differently. 1) Group-level hidden flag: some Teams backed by a Microsoft 365 (unified) Group had HiddenFromExchangeClientsEnabled set, which prevented Exchange/Outlook from listing the group and its calendar; the attribute was cleared using Exchange Online PowerShell (Set-UnifiedGroup in a connected ExchangeOnline session) and the group/calendar became visible. 2) Mailbox-level address-list hiding: other incidents were mailboxes with address-list visibility disabled (HiddenFromAddressListsEnabled), which caused the account to be absent from GAL/address-book views; the mailbox visibility attribute was changed and the team noted that propagation to address lists could take a few days. 3) Management-path confusion: some objects were Microsoft 365 (unified) groups rather than legacy distribution lists and therefore did not appear or could not be managed in the classic EAC distribution-list view; these were managed via Microsoft 365 admin center / Teams / Azure AD or the unified-group PowerShell cmdlets. In all cases primary SMTP and proxy addresses were reviewed and reconciled to avoid duplicate-address conflicts when recreating or renaming objects; Teams channel/resource addresses were recorded when relevant to permission or ownership updates.

6. Outlook desktop rules: forwarding rules not persisting or applying
90% confidence
Problem Pattern

Users created forwarding rules in the Outlook desktop client; client-side rules appeared but did not take effect, while server-side rules could be created but disappeared when reopening "Rules and Alerts". No error codes were shown; result was forwarding rules being lost or not applied from the desktop client.

Solution

The issue was worked around by creating the forwarding rule in Outlook Web (office.com/OWA) instead of the desktop client. A server‑side forwarding rule created via the web client persisted and delivered as expected; the desktop Rule Assistant appeared to lose or fail to apply rules in this environment.

Source Tickets (1)
7. Mailbox display name mismatch in GAL / address lists
95% confidence
Problem Pattern

Mailbox entries in Exchange/Outlook Global Address List or address books showed incorrect or outdated display names (for example unexpected academic titles such as “Dr.” or old naming formats), or mailboxes remained discoverable in the GAL despite user privacy requests. Symptoms were visible in address-book searches and client address lists; no error codes were reported. Affected systems included Exchange Online / Office 365, Azure AD, Outlook and HR/directory synchronization systems (e.g., Workday).

Solution

Two classes of address-book issues were resolved. For incorrect or outdated display names — including cases where an account re-creation in an HR system (Workday) had added an unwanted title — administrators updated the mailbox/displayName attributes in the directory/mail server (Exchange Online / Azure AD). Those server-side attribute changes took effect immediately on the server and propagated to Outlook clients and the Global Address List after directory/mail synchronization, typically over a few days. For privacy/visibility requests, administrators hid the mailbox from address lists using the Exchange Admin Center (“Hide from address lists”); after saving the change the mailbox was removed from GAL/address-book search results once propagation completed. Affected systems referenced in these fixes included Exchange Online / Office 365, Azure AD, Outlook and the HR/directory sync pipeline.

8. Mobile sign-in failures on iPhone where login aborted immediately after password entry
61% confidence
Problem Pattern

Users could not sign in to Exchange mail from Apple Mail (macOS Internet Accounts), iPhone Mail, or Outlook for iOS after enabling modern MFA/2FA. Symptoms included immediate sign-in aborts after entering the Microsoft 365 password (mobile), or continuous repeated password prompts (~dozens–100/day) in macOS Internet Accounts with Touch ID/biometrics ineffective. The same credentials worked from desktop SSO/Okta or in an OAuth-capable Outlook client. The failures occurred when clients attempted legacy/basic Exchange authentication or non‑OAuth sign-in flows.

Solution

Access failures were traced to legacy/basic Exchange authentication being unavailable and to client sign-in paths that did not use OAuth/Modern Authentication. Remediation in resolved cases included reprovisioning the mailbox with Modern Authentication or moving the user to an OAuth-capable client (Microsoft Outlook) so the flow reached MFA. In one case the credential flow was replaced and the user’s password was reset to remove/normalize characters that had been breaking the mobile sign-in path; after the password change and re-enrolment the sign-in proceeded to MFA and completed. Investigation confirmed that Apple Mail/macOS Internet Accounts can repeatedly prompt for passwords or present failed biometric prompts when they cannot perform an OAuth/MFA exchange, so using an OAuth-capable client or reprovisioning the account for Modern Auth resolved access.

9. Third-party tools (EWS-based) missing guest members because guest accounts have empty mail attribute
90% confidence
Problem Pattern

Third-party sending systems or Exchange recipient-expansion (dynamic distribution/groups) omitted expected recipients from recipient lists without SMTP/delivery errors, causing users to not receive mailings. The symptom commonly affected external/guest accounts or any Azure AD user objects with missing or empty mail or proxyAddresses attributes; affected users simply did not appear in recipient expansions or message-trace recipient lists. Senders included mail-merge tools and survey systems, and resending sometimes reached the user when a different recipient-resolution path was used.

Solution

Incidents were resolved by ensuring affected Azure AD user objects contained a valid mail and/or proxyAddresses attribute so that EWS-based recipient-resolution returned them. Guest accounts were updated with the appropriate mail and/or proxyAddresses values; after those attributes were present, EWS-using tools (for example, JungleMail) and survey sending systems successfully included the users. Message trace output had shown the missing users were not present in recipient expansions. As an alternative root-cause mitigation, replacing EWS-based recipient-resolution queries with Microsoft Graph-based queries avoided the limitation because Graph can return guest members in more attribute scenarios.

Source Tickets (2)
10. Conditional Access / MFA login loop caused by identity provisioning and dynamic group assignment
90% confidence
Problem Pattern

Users experienced an Office sign-in loop or were unable to authenticate because they were unexpectedly placed into the student MFA Conditional Access group (IUG-AAD-ASS-ConditionalAccess-Student-MfA). The membership was being driven by the account's iubh.de email domain and by inconsistent identity lifecycle events across Microsoft Entra (Azure AD), on‑prem AD sync, Okta and Workday, producing duplicate or mismatched accounts and incorrect dynamic group assignment. Affected systems included Entra/Azure AD conditional access, AD sync, Okta/Workday provisioning and Microsoft Office sign-in.

Solution

The incident was resolved by removing the affected account from the IUG-AAD-ASS-ConditionalAccess-Student-MfA group and consolidating the user's identity across the provisioning chain so a single authoritative account existed. Duplicate/linked identities were consolidated, dynamic group membership rules/attributes were corrected so the iubh.de address no longer triggered student group assignment, and a full directory resynchronization was performed between Active Directory, Microsoft Entra and Okta/Workday. After consolidation and resync the user could authenticate normally and the email rename propagated without re-triggering the student MFA policy.

Source Tickets (1)
11. Permanent mailbox data loss when Deleted Items and backups contain no recoverable copies
90% confidence
Problem Pattern

Mailbox messages were permanently removed such that Deleted Items, Recoverable Items and backup systems contained no copies. Symptoms included mass automated deletion events or tenant retention policies configured to permanently delete after a set period (e.g., 90 days), folder-level retention labels that continued to show a short retention value and could not be changed by end users, and inability to restore messages via Exchange/EAC, backup tools or vendor/Microsoft support.

Solution

Investigations combined Exchange Admin Center searches, PowerShell mailbox searches, mail-trace analysis, review of applied retention tags/policies, backup vendor (AvePoint) recovery attempts, and escalation to Microsoft support. Outcomes and findings were: - In accidental/mass-delete cases (for example bulk Workday reminders preceding the deletion) mail trace confirmed high-volume deletion activity, Deleted Items and Recoverable Items contained no matching copies, AvePoint and Microsoft could not locate recoverable copies, and Microsoft support confirmed messages could not be restored. - In retention-driven cases a folder had an applied retention setting that permanently deleted items after 90 days; attempts to change the folder/message retention via the mailbox UI or non-privileged PowerShell did not take effect because the retention tag/policy was managed at the tenant/compliance level and required tenant compliance/admin control. - Where retention had already expired and the policy had permanently purged items, neither Exchange nor third-party backups retained recoverable copies and the data was effectively unrecoverable. Mitigation and disposition actions recorded: teams were advised to involve tenant compliance or Exchange Online administrators to review and, if appropriate, change retention policy configuration for affected mailboxes; for critical scanned records that must be retained longer-term, teams were directed to use an archival location (for example SharePoint) or to request a change to the organization's retention policy so records are preserved beyond the enforced deletion window. No recoveries were possible when retention/purge had already removed items from all recoverable stores and backups.

Source Tickets (2)
12. Automated LMS (LMS365/Zensai) cancellations generating calendar cancel emails
65% confidence
Problem Pattern

Instructor-led events in LMS365 / Zensai were automatically cancelled without administrator action; learners and organizers received system-generated cancellation emails and Teams meeting cancellation invites. The cancellations appeared as calendar cancellation messages originating from the tenant, affected events already with registered learners, and raised questions whether Exchange/Teams delivered or triggered the cancellations. Administrators requested message-trace and mail header analysis to determine origin and transport path.

Solution

Message-trace and header inspection proved the cancellation notices were genuine calendar CANCEL messages sent through Exchange Online and not a client-side UI glitch. The traces showed the cancellations originated from the LMS365 integration using its service account/shared organizer mailbox (the LMS application principal was visible in transport headers) and were submitted via the tenant’s connector/API path (Graph/EWS-like submission) rather than being generated by end-user Outlook clients. Root cause was an automated LMS scheduled job that flagged certain sessions as cancelled (due to duplicate/overlapping session records and a misapplied recurrence/reschedule policy in the Zensai/LMS365 configuration). The team disabled the offending scheduled cancellation workflow in the LMS, corrected the event mapping so the LMS used a dedicated organizer mailbox, removed duplicate session records, and validated subsequent message-traces; automated cancellations stopped after these changes.

Source Tickets (1)
13. Password reset / account recovery when reset email targets the inaccessible mailbox
95% confidence
Problem Pattern

Users could not sign in to their Microsoft 365 / Exchange Online mailboxes because password-reset messages were delivered to the same inaccessible mailbox or the user had no initial mailbox credentials. Symptoms included blocked sign-in or no explicit error, and sometimes inconsistent access where the user could sign into other Microsoft services (myCampus, Teams, Microsoft account) but not the mailbox. Some incidents involved duplicate or overlapping accounts/aliases that caused confusion about which identity controlled mailbox access. Affected systems: Microsoft 365/Exchange Online, IU Mail and related Microsoft account integrations.

Solution

Support initiated password resets for the affected Exchange Online accounts and redirected reset messages or provided reset details to the users' external recovery addresses (examples: Gmail, GMX) or via informational email. Users used the external recovery messages or provided reset details to complete the password change and subsequently regained mailbox access. One case showed inconsistent access across Microsoft services that suggested duplicate/overlapping accounts, but resetting the specific mailbox account restored access in that instance.

14. Mailbox approaching 100 GB quota — archive options and trade-offs
90% confidence
Problem Pattern

A user's Exchange Online mailbox was near the 100 GB size limit (approximately 97.03 GB of 99 GB) causing concerns about capacity, potential Outlook unresponsiveness, and the need to free space. The organization considered Exchange Online In‑Place Archive, PST/export options, and SharePoint/OneDrive as retention/archiving alternatives but faced uncertainty about access, device support, and data management implications.

Solution

The support decision was to not enable Exchange Online In‑Place Archive for this user at that time. The ticket captured the rationale: limited admin experience with the archive feature, known constraints such as lack of smartphone access to the archive, unclear assistant/delegate access implications, and the risk that an archive could also reach capacity. PST and SharePoint/OneDrive alternatives were reviewed and documented with their trade‑offs (PST corruption risk, manual rights management, accessibility differences). The user retained the existing mailbox configuration and continued manual mailbox cleanup as the immediate course of action.

Source Tickets (2)
15. Sender does not receive copy of email sent to Microsoft 365 (Office 365) Group
95% confidence
Problem Pattern

A user sent email to a dynamic Microsoft 365 group and did not receive a copy of the message in their inbox despite being a group member; there were no delivery errors. The issue involved Microsoft 365 Groups (Office 365 groups), Exchange Online, and Outlook clients.

Solution

Support determined this behavior was 'by design' for Microsoft 365/Office 365 groups: senders do not automatically receive a copy of messages they send to a group unless the group's delivery/subscription option is enabled. The user was informed of the design behavior and directed to enable the group's delivery/subscribe setting per Microsoft documentation to receive copies of messages they send to the group.

Source Tickets (1)
Back to Summaries
An unhandled error has occurred. Reload X